Описание
moxieplayer.as in Moxiecode moxieplayer, as used in the TinyMCE Media plugin in WordPress before 3.5.2 and other products, does not consider the presence of a # (pound sign) character during extraction of the QUERY_STRING, which allows remote attackers to pass arbitrary parameters to a Flash application, and conduct content-spoofing attacks, via a crafted string after a ? (question mark) character.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 3.5.2+dfsg-1 |
esm-apps/xenial | not-affected | 3.5.2+dfsg-1 |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [3.5.2+dfsg-1]] |
lucid | ignored | end of life |
precise | ignored | end of life |
precise/esm | DNE | precise was needs-triage |
quantal | ignored | end of life |
raring | ignored | end of life |
saucy | not-affected | 3.5.2+dfsg-1 |
trusty | not-affected | 3.5.2+dfsg-1 |
Показывать по
4.3 Medium
CVSS2
Связанные уязвимости
moxieplayer.as in Moxiecode moxieplayer, as used in the TinyMCE Media plugin in WordPress before 3.5.2 and other products, does not consider the presence of a # (pound sign) character during extraction of the QUERY_STRING, which allows remote attackers to pass arbitrary parameters to a Flash application, and conduct content-spoofing attacks, via a crafted string after a ? (question mark) character.
moxieplayer.as in Moxiecode moxieplayer, as used in the TinyMCE Media ...
moxieplayer.as in Moxiecode moxieplayer, as used in the TinyMCE Media plugin in WordPress before 3.5.2 and other products, does not consider the presence of a # (pound sign) character during extraction of the QUERY_STRING, which allows remote attackers to pass arbitrary parameters to a Flash application, and conduct content-spoofing attacks, via a crafted string after a ? (question mark) character.
4.3 Medium
CVSS2